Since the introduction of GDPR and related regulations an increasing number of BackupAssist customers are looking to tighten up security on their backups especially backups using the File Archiving engine by enabling encrypted zip backups.
To help meet these requirements the BackupAssist developers have increased the privacy of encrypted File Archiving backups in BackupAssist 10.4.
Managing your overheads.
It’s just one of the endless art forms you need to master when you take the decision to become the owner of a small business.
In an ideal world, your IT expenses at least, would all be handled by a wonderfully competent outsourced IT support firm. Failing that, a trusted team of dedicated IT staff.
In my experience of the size of companies we tend to work with, it’s quite possible you’re not in possession of either of those things, and that can bump IT-related decisions down the priority order occasionally.
Ah, the good old days of Windows ’98.
That period will, of course, stick in your mind for ‘Bootie Call’ by All Saints topping the charts, and the release of the undisputed king of phones, the Nokia 5110.
They were, however, magical times for another reason.
Our businesses weren’t under permanent attack.
On-site or off-site backup.
Which is right for your business?
When you’re thinking about the backup approach that best fits your small business, committing solely to one option is unlikely to be the silver bullet you might like.
However, your choices may not be quite as binary as you could be led to believe either.
What if there was a way to keep a local backup for really quick recovery of files, applications, and servers, that also combined the security and reliability of a cloud giant like Amazon?
Enter BackupAssist and the Cloud Backup Add-on!
In case you missed the announcement, BackupAssist recently added WebDAV to the suite of backup job types the software is able to support. Intended for those who wish to back up their data to an off-site destination, the protocol enables admins to create encrypted, incremental backups to either a third party hosting company, another Windows server or a NAS device.
The latter is a popular choice, particularly for the smaller business. They’re a good option because once the hardware’s paid for, there’s no monthly recurring charge as you’d tend to expect from a cloud storage provider. Also, the portability of the small units means they can be ‘seeded’ to locally and then moved. In most cases, you have physical access too, which means you’re not relying on an Internet connection for your data in disaster recovery scenarios
In this post, I focus on the steps for configuring one of the more common NAS devices I come into contact with, the Synology. The requirements will be the same for other brands, however, the exact steps and screenshots will of course differ. Continue reading
Alright, so it’s time to log in to that site you’ve not used in a while.
Username and password? Yep, no problem…
….okay, what about B1ngoWozH1sNamo21?
It’s a familiar tale in this wonderful digital age in which we live – we’re surrounded by a bottomless pool of amazing websites and services, all climbing over one another to improve our lives, however, every one of the darned things requires a registration.
It’s been a couple of months since we announced the launch of BackupAssist v10 and its super efficient new cloud backup engine. The significance of the new engine is that it unlocks the possibility of using public cloud giants AWS and Azure as backup destination options.
While the BackupAssist side of things is typically easy to configure, I’ve had a few requests for help navigating Azure’s configuration options, so in this article, I’ll be walking through the steps as they are today.
Unless you’ve somehow managed to avoid both the news headlines and the barrage of content from IT security vendors that followed, you’ll no doubt be aware that a couple of weeks ago, there was a particularly severe ransomware attack that affected over 100,000 businesses around the globe, including the NHS.
The latest evidence indicates that the recent ‘WannaCry’ attack originated via an exploit tool created by the NSA, however it’s more common they originate via ‘phishing’ emails, the technique of tricking recipients into clicking a malicious link or opening an attachment, often appearing to be from a colleague or relative.
So with this in mind, now seems like a great time to give you a refresher on the features at your disposal as an MDaemon administrator to help prevent the type of phishing attack that can lead to a ransomware infection, along with some additional tips on best practice.
(Almost all of the security tools for MDaemon are in the SecurityPlus add-on so for the purpose of this post, I’ll be assuming you’ve got that installed.)
Last week we let you know about the release of MailStore v10.1, the centrepiece of which was a simple but useful feature we’ve been asked for quite a bit – scheduled email reporting.
You may be thinking, MailStore is German so there won’t be any issues to report on!? Well, not everything about your email is under MailStore’s control, so as an administrator, it’s still nice to see confirmation that your ‘Enten in einer Reihe’ occasionally.
In this blog post, I’ll show you how to enable the delightful HTML report email, and let you know how to get the most from it.